Author:
Abdulhammed Omar Y.,Karim Pshtiwan J.,Arif Dashne R.,Ali Twana S.,Abdalrahman Avin O.,Saffer Arkan A.
Abstract
The stegangraphic system supply premium secrecy and ability of conserving the mystery information from gaining stalked or cracked. The suggested method consists of three phases which are edge detection, embedding and extraction. This paper concentrated on three basic and significant parts which are payload, quality, and security also introduces a new steganography method by using edge detection method and shark smell optimization to effectively hide data with in images. Firstly, to promote the hiding ability and to realize altitude standard of secrecy the mystery message is separated into four parts and the cover image is masked and also divided into four sections, then the edge detection algorithm and shark smell optimization is performed on each section respectively. Edge prospectors were utilized to produce edge pixels in every section to hide mystery message and attain the best payload. To increase security, the shark smell optimization is used to select the best pixels among edge pixels based on its nature in motion, then reflect these pixels above original carrier media. Finally the mystery message bits are hidden in the selected edge pixels by using lest significant bit technique. The experimental outcomes appreciated utilizing several image fitness appreciation fashion, it displays best hiding ability, achieve higher image quality with least standard of deformation and provide altitude standard of secrecy, also the results shows that the suggested method exceeds previous approaches in idioms of the PSNSR, MSE also demonstrate that the mystery information cannot be retrieved of the stego image without realizing the algorithms and the values of parameters that are used in hidden process
Publisher
Sulaimani Polytechnic University
Subject
General Economics, Econometrics and Finance
Reference47 articles.
1. [1] B. T. Ahmed and O. Y. Abdulhameed, "Fingerprint recognition based on shark smell optimization and genetic algorithm," International Journal of Advances in Intelligent Informatics, Vol. 6, No. 2, , pp. 123-134, https://doi.org/10.26555/ijain.v6i2.502, July 2020.
2. [2] A. Rezaei , L. Farzinvash and A. Farzamnia, " A Novel Steganography Algorithm using Edge Detection and MPC Algorithm," 16th International ISC Conference on Information Security and Cryptology, https://doi.org//10.1109/ISCISC48546.2019.8985150. 2019.
3. [3] M. Hussain, A. W. A. Wahab, Y. I. Bin Idris, A. T. S. Ho, and K.-H.Jung, "Image steganography in spatial domain: A survey," Signal Process. Image Commun., vol. 65, pp. 46-66, Jul. 2018.
4. [4] S. Sun,"A novel edge based image steganography with 2k correction and Huffman encoding", Inform. Process.Lett., vol. 116, no. 2, pp.93-99. 2016.
5. [5] A. A. Abdulla, H. Sellahewa and S. A. Jassim, "Improving embedding efficiency for digital steganography by exploiting similarities between secret and cover images," Multimedia Tools and Applications, https://doi.org/10.1007/s11042-019-7166-7.2019.